Strategic advice & alerts to leverage data analytics & new technologies

Leverage data and the technologies that generate it, from IoT to AI/machine learning, wearables, blockchain, and more, to improve decision-making, enrich collaboration and enable new services.

Learn More

Recently Published

Although many organizations’ IT departments have begun to focus on quickly adopting emerging technol­ogies, many of those organizations struggle to balance the need to deploy new technology with speed and agility while maintaining compliance with their organization’s traditional risk management frameworks. This struggle is why organizations adopting BaaS must shift from letter of the law (“box-checking compliance”) to spirit of the law (principles-based compliance) risk management (i.e., to risk-based methodologies whose foundational risk mitigation principles align with desired business outcomes).
In response to the coronavirus pandemic, facial recognition vendors are developing new algorithms and employing multiple biometric technologies to enable their products to identify people wearing masks.
In this last article of the data lakehouse series, the author polishes his crystal ball and shares his opinions on the likely direction of the data architecture considerations around warehouses, lakes, and any other forthcoming popular memes.
Cutter Consortium Senior Consultant and frequent contributor Paul Clermont uses his well-known “straight talking” style to paint a clear picture of the “broad scope of threats” we are facing. He uses anthropological analogies to explain the “circles of trust” we use in deciding what to believe. Clermont doesn’t shy from the potential conflicts among information transparency, privacy, and intellectual property. He then looks at the proper role of governments in creating the frameworks and standards that can help improve trustworthiness.
David Tayouri brings us the perspective of the Israeli defense environment, justly famous for its leadership in cybersecurity. For Tayouri, the combination of biometrics, asymmetric cryptography (think “PKI”), and blockchain can help construct a strong authentication and authorization environment, which is crucial to, in his words, “reconstruct virtual trust.”
Philippe Flichy tells us that there are three complementary facets we need to consider when it comes to trustworthiness, particu­larly in an industrial environment: trusting the data, a challenge made more difficult by the emergence of IoT, digital transformation, and cyberattacks; trusting the tools, for example, the machine learning algorithms whose innards are, almost by design, largely inscrutable; and trusting the people, given the pandemic-era new work practices.
Using the “technology as the solution” line of thought but with the added twist of putting a human in the loop, a team of eight coauthors led by Greek academic Panagiotis Monachelis proposes to combine peer-to-peer decentralized networks and blockchain technology to address the challenge of misinformation in social media. The authors provide a detailed description of an architecture, embodied in their research project called EUNOMIA, that allows end users to review posts and feed a secure voting system.
Robert A. Martin addresses the complete ecosystem involved in the procurement of products and services. What does it mean to trust that what you buy, and the organizations that sell to you, meet all the conditions required to merit your trust? Martin describes the elements of a system of trust for supply chain security that is currently under development and is based on collecting information from a wide community of procurement departments and standards organizations.